Download presentation
Presentation is loading. Please wait.
Published byShea Frankum Modified over 10 years ago
1
MPLS-based traffic shunt Nicolas FISCHBACH [nico@colt.net] Senior Manager - IP Engineering/Security RIPE46 - Sept. 2003
2
Nicolas FISCHBACH - RIPE46 Sept. 2003 Contributors COLT Telecom –Andreas Friedrich –Marc Binderberger Riverhead Networks –Yehuda Afek –Anat Bremler-Barr –Boaz Elgar –Roi Hermoni Cisco Systems –Roy Brooks –Paul Quinn
3
Nicolas FISCHBACH - RIPE46 Sept. 2003 Agenda DDoS Protection Deployed mitigation methods MPLS-based traffic shunt Conclusion Securing the infrastructure ? –To be discussed at the nsp-sec BoF Tuesday evening !
4
Nicolas FISCHBACH - RIPE46 Sept. 2003 Distributed Denial of Service Protection Data-center vs infrastructure approach Why strict filtering isn’t (always) the answer –usually means the attacker “won” –some traffic can’t be filtered at the router level –layer 4+ –traffic requiring *real* state information (not only “bit is set) –after “everything on top of IP” the trend is “everything on top of HTTP”… wanna filter 80/tcp ? ;-) –is your network’s physical and logical structure enabling you to filter at the Edge and not in the Core ? –you are tired of arguing with your network architecture team (“we are here to transport packets” vs “the Internet firewall” ;-)
5
Nicolas FISCHBACH - RIPE46 Sept. 2003 Deployed mitigation methods What do/should SPs support/do ? –(propagated) blackholing –(de-aggregate and) stop to announce - bad practice ? [dampening, BGP table size, filters, etc.] –sinkholes –rate-limiting –ACLs –iACLs (infrastructure) –tACLs (transit) –re-coloring
6
Nicolas FISCHBACH - RIPE46 Sept. 2003 Sinkhole 61.1.1.1 Announce: 61.1.1.1 -> Sinkhole Sinkhole server
7
Nicolas FISCHBACH - RIPE46 Sept. 2003 Traffic Shunt 61.1.1.1 Inspection device “Good” traffic “Bad” traffic
8
Nicolas FISCHBACH - RIPE46 Sept. 2003 Sinkhole vs Shunt Sinkhole –Uni-directional –Data in, no data out –IP based –Blackholing traffic, forensics –[CenterTrack, NANOG17] Shunt –Bi-directional –Data in, processed and data out –Tunnels: GRE, MPLS, L2TPv3, etc. –DDoS cleaning, reserve proxy, traffic analysis –[Bellwether, NANOG19]
9
Nicolas FISCHBACH - RIPE46 Sept. 2003 IP-based Traffic Shunt Tunnels examples –From the peering/upstream routers to the inspection device –From the inspection device to the CPE/end-system –A mix/combination of both Limitations –Careful setup required to avoid loops –Returned traffic must not pass through a peering router –Cisco GSRs and Juniper require a dedicated interface card to act as a tunnel server (GRE/IPIP) –Processing overhead
10
Nicolas FISCHBACH - RIPE46 Sept. 2003 MPLS-based Traffic Shunt Advantages –Doesn’t require a special/dedicated interface card –No extra HW load or SW (IOS 12.0(17)ST+ and JunOS 5.4+) –If your network is MPLS-enabled, operations knowledge should be there: no need for the network to be MPLS- only! “Normal” routed IPv4 traffic can be carried in parallel –Minimal (initial) static configuration with dynamic LSPs (iBGP triggered) –Low (zero ?) overhead [did someone just say “why not use Policy Based Routing” ? ;-] –A MPLS-speaking inspection device isn’t required (option)
11
Nicolas FISCHBACH - RIPE46 Sept. 2003 MPLS-based Traffic Shunt Advantages (cont.) –Enables you to overcome the “this device is in-line only” and “you need one inspection device per peering/upstream)” limitations: profile traffic and (potential) victims, select key POPs/IXes and deploy there –Not on the critical path and quite scalable –LDP only carries the loopback address of the inspection device Caveats –You may carry the traffic through the backbone (depending on how distributed your deployment is) –Latency: a few more ms (extra hops/distance) –Peering Router that also acts as an Access Router (unless you (can) use more specific routes)
12
Nicolas FISCHBACH - RIPE46 Sept. 2003 MPLS-based Traffic Shunt Two methods –Pure MPLS using Proxy Egress LSP (*) –Penultimate hop popping –RFC 3031 –MPLS VPNs using VRFs –see: http://www.nanog.org/mtg-0306/afek.html [NANOG28]
13
Nicolas FISCHBACH - RIPE46 Sept. 2003 MPLS LSPs based on loopbacks 61.1.1.1 LSPs Inspection device
14
Nicolas FISCHBACH - RIPE46 Sept. 2003 4 InOut MPLS Table (6, 3 )(5, 42) InOut MPLS Table (5, 25 )(2, 3) InOut MPLS Table (2, untagged)(4, 25) IP 42 IP 3 25 IP InOut MPLS Table (2, 42)IP: a Loop back 22565 2 IP: a LSP LSP Proxy Egress Loopback Insp. Device iBGP IP Lookup Penultimate Router MPLS LSP Proxy Egress
15
Nicolas FISCHBACH - RIPE46 Sept. 2003 61.1.1.1 Penultimate Router iBGP MPLS LSP Proxy Egress
16
Nicolas FISCHBACH - RIPE46 Sept. 2003 FRANKFURT#show mpls forwarding-table labels 16 Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface 16 Untagged 61.222.65.77/32 24831266 Gi6/0 61.44.88.111 LONDON#show mpls forwarding-table 61.222.65.77 Local Outgoing Prefix Bytes tag Outgoing Next Hop tag tag or VC or Tunnel Id switched interface 503 560 61.222.65.77/32 0 PO11/0 point2point Deployment example
17
Nicolas FISCHBACH - RIPE46 Sept. 2003 61.1.1.1 iBGP IPv4 FBF interface The Juniper way (courtesy of Riverhead)
18
Nicolas FISCHBACH - RIPE46 Sept. 2003 Conclusion Actually deployed, not only in the lab Proved easy to deploy, maintain and use Improved DDoS detection, mitigation and analysis/post-mortem in conjunction with Netflow- based detection solution and customer profiling (filtering templates) Any question ? Technical Notes & configurations examples: boaz@riverhead.com
19
Nicolas FISCHBACH - RIPE46 Sept. 2003 Thank you Nicolas FISCHBACH - RIPE46 Sept. 2003
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.